BrowserCRM Results.PHP跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1196184 漏洞类型 跨站脚本
发布时间 2006-02-02 更新时间 2006-02-03
CVE编号 CVE-2006-0521 CNNVD-ID CNNVD-200602-039
漏洞平台 N/A CVSS评分 4.3
|漏洞来源
https://cxsecurity.com/issue/WLB-2006020003
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-039
|漏洞详情
BrowserCRM的results.php中存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助对query参数的特定操作(如通过IMGSRC标签所示)来注入任意Web脚本或HTML。
|漏洞EXP
Inputs in the BrowserCRM is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.

Some fields have been filtered in a basic form, so that simple scripting like "<script>alert('XSS')</script>" is not possible. Howevere, since the filtering is not based on white listing you can conduct successful XSS attacks with code like "<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>".

PoC: http://www.SITE.example/modules/Search/results.php?query=%3CIMG+SRC%3Dja
vascript%3Aalert%28String.fromCharCode%2888%2C83%2C83%29%29%3E

Vendors site:http://www.browsercrm.com/

Please credit to: Preben Nyl?kken
|参考资料

来源:BUGTRAQ
名称:20060131BrowserCRMvulnerableforXSS
链接:http://www.securityfocus.com/archive/1/archive/1/423546/100/0/threaded
来源:VUPEN
名称:ADV-2006-0391
链接:http://www.frsirt.com/english/advisories/2006/0391
来源:SECUNIA
名称:18658
链接:http://secunia.com/advisories/18658
来源:XF
名称:browsercrm-results-xss(24390)
链接:http://xforce.iss.net/xforce/xfdb/24390
来源:BID
名称:16435
链接:http://www.securityfocus.com/bid/16435
来源:OSVDB
名称:22841
链接:http://www.osvdb.org/22841
来源:SREASON
名称:393
链接:http://securityreason.com/securityalert/393